Security (V) Flashcards

1
Q

VLAN Hopping

A

*Ability to send traffic from one VLAN into another, bypassing VLAN segmentation
*Sending packets to a port not usually accessible from an end system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP Spoofing

A

Sending falsified ARP Messages over a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

Occurs when an attacker masquerades as another person by falsifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On-Path/Man-in-the-Middle (MITM) Attack

A

Occurs when an attacker puts themselves between the victim and the intended destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Session Hijacking

A

Attacker guesses the session ID in use between a client and server and takes over the authenticated session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS Poisoning

A

An attacker manipulates known vulnerabilities within DNS to reroute traffic to a fake version of a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue DHCP Server

A

A DHCP server on a network which is not under the administrative control of the network admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP SYN Flood

A

Occurs when an attacker initiates multiple TCP sessions, but never completes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smurf Attack (ICMP Flood)

A

An attacker sends a ping to a subnet broadcast address with the source IP spoofed to that of the victim server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purging/Sanitizing

A

Removes data which cannot be reconstructed using any known forensic techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Clearing Technique

A

Removes data with a certain amount of assurance that it can’t be reconstructed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control Vestibule (Mantrap)

A

An area between two doorways that holds people until they are identified and authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Access Control (NAC)

A

Ensures a device is scanned to determine its current state of security prior to being allowed network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Persistent Agent

A

A piece of software installed on a device requesting access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Non-Persistent Agent

A

Requires the users to connect to the network and go to a web-based captive portal to download an agent onto their devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero-Day Vulnerability

A

A new vulnerability that no one knows about yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common Vulnerabilities and Exposures (CVE)

A

List of known vulnerabilities

18
Q

Posture Assessment

A

Assesses cyber risk posture and exposure to threats cause by misconfigurations and patching delays.

19
Q

Business Risk Assessment

A

Used to identify, understand, and evaluate potential hazards in the workplace

20
Q

Mandatory Access Control (MAC)

A

Access control policy where the computer system gets to decide who gets access to what objects

21
Q

Zero-Trust

A

A security framework that requires users to be authenticated and authorized before being granted access to applications and data.

22
Q

DMZ

A

A perimeter network that protects an organization’s internal local area network from untrusted traffic

23
Q

Screen Subnet

A

Subnet int the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks

24
Q

Dual Control

A

Two people have to be present at the same time to do something

25
Wireless Analyzer
Ensures you have the proper coverage and helps prevent overlap between wireless access point coverage zones and channels
26
Protocol Analyzer
Used to capture and analyze signals and data traffic over a communication channel
27
Logic Bomb
A specific type of malware that is tied to either a logical event or a specific time
28
Firewall Zone
Firewall interface in which you can set up rules Inside Outside DMZ
29
Unified Threat Management (UTM) Device
Combines firewall, router, intrusion d/p system, anti-malware, and other features into a single device
30
Three methods of intrusion detection
Signature-based Policy-based Anomaly-based
31
Least Functionality
Configuring a device, server, or workstation to only provide essential services required by the user
32
Dynamic ARP Inspection (DAI)
*Validates Address Resolution Protocol (ARP) packets *Helps against ARP Poisoning
33
Stateless Firewall/Packet-Filtering Firewall
*L3 *Does not preserve information about the connection *Each packet is analyzed independently with no record of previously processed packets. *Requires the least processing effort *Can be vulnerable to attacks spread over a sequence of packets *Filter on -IP (source/dest) -Protocol ID/type -Port Number
34
Stateful Inspection Firewalls
*L5 *Maintain stateful information about session *Information is stored in a dynamically updated state table *Once the connection has been allowed, the firewall allows traffic to pass unmonitored, in order to conserve processing effort.
35
Stateful Firewall
Inspects traffic as part of a session and recognizes where the traffic originated
36
NextGen Firewall (NGFW)
Third-generation firewall that conducts deep packet inspection and packet filtering
37
What happens when IDS inspects a packet
* Evaluate the entire packet * Check all the alert rules * Log any matches it finds * Allow it to continue onward to its destination.
38
Aplication-aware Firewall
* Make decisions about what applications are allowed or blocked * Inspecting the data contained within the packets
39
Kerberos
* Authentication protocol * Send data over insecure networks while using strong encryption
40
Network-based anti-malware
* Can be installed as a rack-mounted, in-line network appliance * Don't have to install software on each client. * Often come as part of a UTM
41
WAF (Web Application Firewall)
Protects web applications by filtering and monitoring HTTP traffic between a web application and the Internet.